Your self-managed VPN may be doing more harm than good. Recent reports from Cybersecurity Dive and At-Bay noted that remote access tools were the intrusion point to blame for most ransomware attacks and that in particular, self-managed VPNs from Cisco and Citrix were highly susceptible to such attacks.
At Bay found that companies using self-managed VPNs—those that are self-hosted, implemented on premises, and maintained in house—are at least twice as vulnerable to cyberattack than those who use VPN service providers or no VPN at all. While VPNs are essential in today’s business environment, service provider VPNs are proving to be more secure. This makes sense, since VPN technology is not usually the main area of expertise for the companies who use them, and therefore a self-managed VPN can be misconfigured or grow outdated without the company realizing it. With a service provider VPN, managing and updating the VPN technology is the provider’s responsibility, and they can do this more effectively than their clients can. The tradeoff, however, is that you have less anonymity and control.
Still, if a self-managed VPN is a necessity for your company at this time, there are ways to make it more secure. Courtesy of At-Bay and CyberNINES, here are some tips:
To read the full articles by Cybersecurity Dive and At-Bay, please see the links below:
https://www.at-bay.com/articles/why-vpn-can-be-small-business-weakest-link/